Intelligent systems for security informatics (Oxford; Waltham, 2013). - ОГЛАВЛЕНИЕ / CONTENTS
Навигация

Архив выставки новых поступлений | Отечественные поступления | Иностранные поступления | Сиглы
ОбложкаIntelligent systems for security informatics / Ch.Yang [et al.]. - Oxford; Waltham: Academic Press/Elsevier, 2013. – ix, 205 p.: ill. - (Intelligent systems series). - Incl. bibl. ref. - Ind.: p.199-205. – Пер. загл.: Интеллектуальные системы для безопасности информатики. - ISBN 978-0-12-404702-0
 

Место хранения: 02 | Отделение ГПНТБ СО РАН | Новосибирск

Оглавление / Contents
 
Preface	 ....................................................... ix

Chapter 1: Revealing the Hidden World of the Dark Web:
Social Media Forums and Videos .................................. 1
1.1  Introduction ............................................... 2
1.2  The Dark Web Forum Portal .................................. 3
1.3  The Video Portal .......................................... 13
1.4  Conclusion and Future Directions .......................... 25
Acknowledgments ................................................ 26
References ..................................................... 27

Chapter 2: Proactive Cyber Defense ............................. 29
2.1  Introduction .............................................. 29
2.2  Proactive Filters ......................................... 31
2.3  Early Warning ............................................. 40
2.4  Concluding Remarks ........................................ 48
Acknowledgments ................................................ 49
References ..................................................... 49

Chapter 3: Privacy-Preserving Social Network Integration,
Analysis, and Mining ........................................... 57
3.1  Social Network Analysis and Mining ........................ 51
3.2  Privacy Preservation ...................................... 52
3.3  Information Integration and Privacy Preservation for
     SNAM ...................................................... 54
3.4  Conclusion ................................................ 64
References ..................................................... 64

Chapter 4: A Digraph Model for Risk Identification and
Management in SCADA Systems .................................... 69
4.1  Introduction .............................................. 69
4.2  Background ................................................ 70
4.1  A Digraph Model of SCADA Systems .......................... 71
4.4  Conclusions ............................................... 82
References ..................................................... 83

Chapter 5: High-Level Architecture and Design of a Decision
Engine for Marine Safety and Security .......................... 85
5.1  Introduction .............................................. 86
5.2  Background ................................................ 87
5.3  Conceptual Design ......................................... 91
5.4  Formal Representation .................................... 100
5.5  Application .............................................. 103
5.6  Conclusions and Future Work .............................. 103
Acknowledgments ............................................... 104
References .................................................... 104

Chapter 6: Criminal Identity Resolution Using Personal and
Social Identity Attributes: A Collective Resolution Approach .. 707
6.1  Introduction ............................................. 107
6.2  Related Work ............................................. 109
6.3  A Collective Identity Resolution Approach ................ 113
6.4  Experiments .............................................. 119
6.5  Concluding Remarks ....................................... 123
References .................................................... 123

Chapter 7: Al Qaeda Terrorist Financing ....................... 725
7.1  Importance of Cutting Terrorist Financing ................ 125
7.2  Description of Al Qaeda's Financial Network .............. 126
7.3  History and Development of Al Qaeda and its Financial
     Network .................................................. 128
7.4  Organizational Structure: Control Over Finances Within
     Al Qaeda ................................................. 132
7.5  Al Qaeda's Portfolio and Sources of "Revenues" ........... 135
7.6  Methods of Transferring and Storing Funds ................ 143
References .................................................... 150

Chapter 8: Study on Covert Networks of Terrorists Based on
Interactive Relationship Hypothesis ........................... 755
8.1  Introduction ............................................. 156
8.2  Relevant Works ........................................... 157
8.3  Initial Network Construction ............................. 158
8.4  Network Refinement Based on Interaction Relation
     Hypothesis ............................................... 164
8.5  Relationship Network Refinement and Final Relationship
     Network of Terrorist Organizations and Incidents ......... 171
8.6  Analysis and Verification ................................ 174
8.7  Conclusions .............................................. 178
Acknowledgments ............................................... 179
References .................................................... 179

Chapter 9: Incorporating Data and Methodologies for
Knowledge Discovery for Crime ................................. 181
9.1  Introduction ............................................. 182
9.2  Steps Involved in Crime Investigation .................... 182
9.3  Data Sources for Crime Data Mining and Investigation ..... 183
9.4  The Four Types of Knowledge Discovery .................... 186
9.5  Knowledge Discovery Methodologies for Crime Data ......... 192
9.6  Methodologies Applied to Knowledge Discovery Types ....... 196
9.7  Conclusion ............................................... 197
References .................................................... 197

Index ......................................................... 199


Архив выставки новых поступлений | Отечественные поступления | Иностранные поступления | Сиглы
 

[О библиотеке | Академгородок | Новости | Выставки | Ресурсы | Библиография | Партнеры | ИнфоЛоция | Поиск]
  © 1997–2024 Отделение ГПНТБ СО РАН  

Документ изменен: Wed Feb 27 14:26:38 2019. Размер: 9,395 bytes.
Посещение N 1205 c 05.08.2014